{"id":27202,"date":"2024-09-18T18:03:32","date_gmt":"2024-09-18T18:03:32","guid":{"rendered":"https:\/\/blog.lacnic.net\/?p=27202"},"modified":"2024-09-18T19:49:11","modified_gmt":"2024-09-18T19:49:11","slug":"techniques-solutions-and-best-practices-for-mitigating-ddos-attacks","status":"publish","type":"post","link":"https:\/\/blog.lacnic.net\/en\/techniques-solutions-and-best-practices-for-mitigating-ddos-attacks\/","title":{"rendered":"Techniques, Solutions, and Best Practices for Mitigating DDoS Attacks"},"content":{"rendered":"\n<p>By <a href=\"https:\/\/blog.lacnic.net\/en\/author\/graciela-martinez\/\">Graciela Mart\u00ednez<\/a> and <a href=\"https:\/\/blog.lacnic.net\/en\/author\/guillermo-cicileo\/\">Guillermo Cicileo<\/a><\/p>\n\n\n\n<p>Denial of Service \/ Distributed Denial of Service (<a href=\"https:\/\/blog.lacnic.net\/en\/security-threats-and-controls-for-mitigating-dos-ddos-attacks\/\">DDoS<\/a>) attacks represent a serious problem for Internet organizations. These cyberattacks flood a server, service, or network with large volumes of traffic with the aim of rendering the resource inaccessible to legitimate users.<\/p>\n\n\n\n<p>As discussed in our <a href=\"https:\/\/blog.lacnic.net\/en\/security-threats-and-controls-for-mitigating-dos-ddos-attacks\/\">previous article<\/a>, DDoS attacks are among the most frequent concerns for ISPs.<\/p>\n\n\n\n<p>DDoS attacks exploit vulnerabilities in the various layers of the TCP\/IP stack or overwhelm a network&#8217;s capacity to handle large volumes of traffic. This is why it is important for organizations to implement comprehensive protection.<\/p>\n\n\n\n<p>In this article, <a href=\"https:\/\/csirt.lacnic.net\/en\" target=\"_blank\" rel=\"noreferrer noopener\">LACNIC CSIRT<\/a> shares several actions that can complement a DDoS solution and protect both servers and networks.<\/p>\n\n\n\n<p>Let&#8217;s take a look at existing best practices and techniques for mitigating DDoS attacks, which can be complemented with commercial or open-source anti-DDoS solutions, as described below.<\/p>\n\n\n<section class=\"acf-view acf-view--id--21788 acf-view--object-id--27202\"><div class=\"acf-view__texto_fijo acf-view__row\"><div class=\"acf-view__texto_fijo-field acf-view__field\"><div class=\"acf-view__texto_fijo-choice acf-view__choice\">Additional reading:<\/div><\/div><\/div><div class=\"acf-view__enlace acf-view__row\"><div class=\"acf-view__enlace-field acf-view__field\"><a target=\"_self\" class=\"acf-view__enlace-link acf-view__link\" href=\"https:\/\/blog.lacnic.net\/en\/security-threats-and-controls-for-mitigating-dos-ddos-attacks\/?utm_source=Blog&amp;utm_medium=Nota+relacionada&amp;utm_campaign=Nota+relacionada+DDoS+EN&amp;utm_id=Nota+relacionada+DDoS+EN\">Security Threats and Controls for Mitigating DoS\/DDoS Attacks<\/a><\/div><\/div><\/section>\n\n\n<p><strong>Best Practices and Techniques for DDoS Attack Mitigation<\/strong>. In this first part of our article, we outline the main actions an organization can implement to prevent DDoS attacks (either by lowering their likelihood and\/or by minimizing their impact).<\/p>\n\n\n\n<p>To enhance the configuration of our networks and services to reduce the likelihood of DDoS attacks and strengthen our infrastructure, where feasible, it is advisable to implement redundancy and load distribution, rate limiting, traffic filtering, anycast routing, overload capacity, protection at the protocol level, as well as early detection and response systems. The <a href=\"https:\/\/imasd.lacnic.net\/reportes\/ciberseguridad\/tecnicas-buenas-practicas-mitigar-ataques-ddos-en.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">document<\/a> published on the LACNIC R&amp;D website details these best practices and provides suggestions for implementing them in your networks.<\/p>\n\n\n\n<p>Similarly, mitigation techniques can help reduce the impact of DDoS attacks when they occur. In this sense, an organization targeted by a DDoS attack can minimize its impact if it has tools to detect and handle this type of situation, or if it has a mitigation plan in place specifically designed for this type of incident.<\/p>\n\n\n\n<p><strong>Anti-DDoS Solutions Available on the Market. <\/strong>Multiple vendors and companies offer a variety of anti-DDoS tools. These include both commercial and open-source solutions. Selecting the solution best suited to each organization depends on various factors, including budget, required protection level, and existing infrastructure.<\/p>\n\n\n\n<p>Cloudflare, Akamai, Amazon Web Services (AWS) Shield, Google Cloud Armor, Imperva Incapsula, Arbor Networks, and F5 Networks are among the most widely used solutions due to their effectiveness and ability to handle large volumes of traffic and their ease of integration and use. The features and benefits of each are detailed in our <a href=\"https:\/\/imasd.lacnic.net\/reportes\/ciberseguridad\/soluciones-anti-ddos-existentes-mercado-en.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">document<\/a>.<\/p>\n\n\n\n<p>Among others, open-source solutions include Haproxyr, Gatekeeper, and FastNetMon. These software solutions can be valuable for system administrators and developers seeking to safeguard their applications and networks without the burden of high licensing costs.<\/p>\n\n\n\n<p>Finally, it&#8217;s worth noting that ISPs and security providers often offer DDoS scrubbing services to their customers. These services consist of sending the organization clean traffic after absorbing the attack, as they are supposed to have the intelligence to detect and discard most types of DDoS attacks. To ensure effectiveness, they should be complemented with DNS and BGP solutions.<\/p>\n\n\n\n<p>At LACNIC CSIRT, we urge organizations to examine whether they have already implemented the measures listed above.<\/p>\n\n\n\n<p><\/p>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>By Graciela Mart\u00ednez and Guillermo Cicileo Denial of Service \/ Distributed Denial of Service (DDoS) attacks represent a serious problem for Internet organizations. These cyberattacks flood a server, service, or network with large volumes of traffic with the aim of rendering the resource inaccessible to legitimate users. As discussed in our previous article, DDoS attacks [&hellip;]<\/p>\n","protected":false},"author":6,"featured_media":27196,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":false,"jetpack_social_options":{"image_generator_settings":{"template":"highway","enabled":false},"version":2}},"categories":[499],"tags":[1271],"archivo":[1345,1451],"taxonomy-authors":[1242,1221],"tipo_autor":[],"class_list":["post-27202","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurity","tag-cibersecurity","archivo-editions","archivo-highlights-2023","taxonomy-authors-graciela-martinez-en","taxonomy-authors-guillermo-cicileo-en"],"acf":{"author":"Graciela Mart\u00ednez and Guillermo Cicileo","related_notes":""},"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.0 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>LACNIC Blog | Techniques, Solutions, and Best Practices for Mitigating DDoS Attacks<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/blog.lacnic.net\/en\/techniques-solutions-and-best-practices-for-mitigating-ddos-attacks\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"LACNIC Blog | Techniques, Solutions, and Best Practices for Mitigating DDoS Attacks\" \/>\n<meta property=\"og:description\" content=\"By Graciela Mart\u00ednez and Guillermo Cicileo Denial of Service \/ Distributed Denial of Service (DDoS) attacks represent a serious problem for Internet organizations. These cyberattacks flood a server, service, or network with large volumes of traffic with the aim of rendering the resource inaccessible to legitimate users. As discussed in our previous article, DDoS attacks [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/blog.lacnic.net\/en\/techniques-solutions-and-best-practices-for-mitigating-ddos-attacks\/\" \/>\n<meta property=\"og:site_name\" content=\"LACNIC Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/facebook.com\/lacnic\" \/>\n<meta property=\"article:published_time\" content=\"2024-09-18T18:03:32+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-09-18T19:49:11+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2024\/09\/tecnicas-soluciones-buenas-practicas-para-mitigar-ataques-ciberneticos-2024-set.png\" \/>\n\t<meta property=\"og:image:width\" content=\"680\" \/>\n\t<meta property=\"og:image:height\" content=\"330\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Gianni\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@lacnic\" \/>\n<meta name=\"twitter:site\" content=\"@lacnic\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/blog.lacnic.net\/en\/techniques-solutions-and-best-practices-for-mitigating-ddos-attacks\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/blog.lacnic.net\/en\/techniques-solutions-and-best-practices-for-mitigating-ddos-attacks\/\"},\"author\":{\"name\":\"Gianni\",\"@id\":\"https:\/\/blog.lacnic.net\/#\/schema\/person\/1338d9cfdb0137e8bc5581f3771f39ab\"},\"headline\":\"Techniques, Solutions, and Best Practices for Mitigating DDoS Attacks\",\"datePublished\":\"2024-09-18T18:03:32+00:00\",\"dateModified\":\"2024-09-18T19:49:11+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/blog.lacnic.net\/en\/techniques-solutions-and-best-practices-for-mitigating-ddos-attacks\/\"},\"wordCount\":537,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/blog.lacnic.net\/#organization\"},\"image\":{\"@id\":\"https:\/\/blog.lacnic.net\/en\/techniques-solutions-and-best-practices-for-mitigating-ddos-attacks\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2024\/09\/tecnicas-soluciones-buenas-practicas-para-mitigar-ataques-ciberneticos-2024-set.png\",\"keywords\":[\"Cibersecurity\"],\"articleSection\":[\"Cybersecurity\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/blog.lacnic.net\/en\/techniques-solutions-and-best-practices-for-mitigating-ddos-attacks\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/blog.lacnic.net\/en\/techniques-solutions-and-best-practices-for-mitigating-ddos-attacks\/\",\"url\":\"https:\/\/blog.lacnic.net\/en\/techniques-solutions-and-best-practices-for-mitigating-ddos-attacks\/\",\"name\":\"LACNIC Blog | Techniques, Solutions, and Best Practices for Mitigating DDoS Attacks\",\"isPartOf\":{\"@id\":\"https:\/\/blog.lacnic.net\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/blog.lacnic.net\/en\/techniques-solutions-and-best-practices-for-mitigating-ddos-attacks\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/blog.lacnic.net\/en\/techniques-solutions-and-best-practices-for-mitigating-ddos-attacks\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2024\/09\/tecnicas-soluciones-buenas-practicas-para-mitigar-ataques-ciberneticos-2024-set.png\",\"datePublished\":\"2024-09-18T18:03:32+00:00\",\"dateModified\":\"2024-09-18T19:49:11+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/blog.lacnic.net\/en\/techniques-solutions-and-best-practices-for-mitigating-ddos-attacks\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/blog.lacnic.net\/en\/techniques-solutions-and-best-practices-for-mitigating-ddos-attacks\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/blog.lacnic.net\/en\/techniques-solutions-and-best-practices-for-mitigating-ddos-attacks\/#primaryimage\",\"url\":\"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2024\/09\/tecnicas-soluciones-buenas-practicas-para-mitigar-ataques-ciberneticos-2024-set.png\",\"contentUrl\":\"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2024\/09\/tecnicas-soluciones-buenas-practicas-para-mitigar-ataques-ciberneticos-2024-set.png\",\"width\":680,\"height\":330},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/blog.lacnic.net\/en\/techniques-solutions-and-best-practices-for-mitigating-ddos-attacks\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Portada\",\"item\":\"https:\/\/blog.lacnic.net\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Techniques, Solutions, and Best Practices for Mitigating DDoS Attacks\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/blog.lacnic.net\/#website\",\"url\":\"https:\/\/blog.lacnic.net\/\",\"name\":\"LACNIC Blog\",\"description\":\"En el Blog de LACNIC encontrar\u00e1s art\u00edculos t\u00e9cnicos vinculados al desarrollo de Internet en la regi\u00f3n de Am\u00e9rica Latina y el Caribe.\",\"publisher\":{\"@id\":\"https:\/\/blog.lacnic.net\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/blog.lacnic.net\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/blog.lacnic.net\/#organization\",\"name\":\"LACNIC Blog\",\"url\":\"https:\/\/blog.lacnic.net\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/blog.lacnic.net\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2023\/03\/lacnic-blog.svg\",\"contentUrl\":\"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2023\/03\/lacnic-blog.svg\",\"caption\":\"LACNIC Blog\"},\"image\":{\"@id\":\"https:\/\/blog.lacnic.net\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/facebook.com\/lacnic\",\"https:\/\/x.com\/lacnic\",\"https:\/\/www.instagram.com\/lacnic\/?hl=es-la\",\"https:\/\/uy.linkedin.com\/company\/lacnic\",\"https:\/\/www.youtube.com\/user\/lacnicstaff\",\"https:\/\/www.lacnic.net\/podcast\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/blog.lacnic.net\/#\/schema\/person\/1338d9cfdb0137e8bc5581f3771f39ab\",\"name\":\"Gianni\",\"url\":\"https:\/\/blog.lacnic.net\/en\/author\/gianni\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"LACNIC Blog | Techniques, Solutions, and Best Practices for Mitigating DDoS Attacks","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/blog.lacnic.net\/en\/techniques-solutions-and-best-practices-for-mitigating-ddos-attacks\/","og_locale":"en_US","og_type":"article","og_title":"LACNIC Blog | Techniques, Solutions, and Best Practices for Mitigating DDoS Attacks","og_description":"By Graciela Mart\u00ednez and Guillermo Cicileo Denial of Service \/ Distributed Denial of Service (DDoS) attacks represent a serious problem for Internet organizations. These cyberattacks flood a server, service, or network with large volumes of traffic with the aim of rendering the resource inaccessible to legitimate users. As discussed in our previous article, DDoS attacks [&hellip;]","og_url":"https:\/\/blog.lacnic.net\/en\/techniques-solutions-and-best-practices-for-mitigating-ddos-attacks\/","og_site_name":"LACNIC Blog","article_publisher":"https:\/\/facebook.com\/lacnic","article_published_time":"2024-09-18T18:03:32+00:00","article_modified_time":"2024-09-18T19:49:11+00:00","og_image":[{"width":680,"height":330,"url":"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2024\/09\/tecnicas-soluciones-buenas-practicas-para-mitigar-ataques-ciberneticos-2024-set.png","type":"image\/png"}],"author":"Gianni","twitter_card":"summary_large_image","twitter_creator":"@lacnic","twitter_site":"@lacnic","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/blog.lacnic.net\/en\/techniques-solutions-and-best-practices-for-mitigating-ddos-attacks\/#article","isPartOf":{"@id":"https:\/\/blog.lacnic.net\/en\/techniques-solutions-and-best-practices-for-mitigating-ddos-attacks\/"},"author":{"name":"Gianni","@id":"https:\/\/blog.lacnic.net\/#\/schema\/person\/1338d9cfdb0137e8bc5581f3771f39ab"},"headline":"Techniques, Solutions, and Best Practices for Mitigating DDoS Attacks","datePublished":"2024-09-18T18:03:32+00:00","dateModified":"2024-09-18T19:49:11+00:00","mainEntityOfPage":{"@id":"https:\/\/blog.lacnic.net\/en\/techniques-solutions-and-best-practices-for-mitigating-ddos-attacks\/"},"wordCount":537,"commentCount":0,"publisher":{"@id":"https:\/\/blog.lacnic.net\/#organization"},"image":{"@id":"https:\/\/blog.lacnic.net\/en\/techniques-solutions-and-best-practices-for-mitigating-ddos-attacks\/#primaryimage"},"thumbnailUrl":"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2024\/09\/tecnicas-soluciones-buenas-practicas-para-mitigar-ataques-ciberneticos-2024-set.png","keywords":["Cibersecurity"],"articleSection":["Cybersecurity"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/blog.lacnic.net\/en\/techniques-solutions-and-best-practices-for-mitigating-ddos-attacks\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/blog.lacnic.net\/en\/techniques-solutions-and-best-practices-for-mitigating-ddos-attacks\/","url":"https:\/\/blog.lacnic.net\/en\/techniques-solutions-and-best-practices-for-mitigating-ddos-attacks\/","name":"LACNIC Blog | Techniques, Solutions, and Best Practices for Mitigating DDoS Attacks","isPartOf":{"@id":"https:\/\/blog.lacnic.net\/#website"},"primaryImageOfPage":{"@id":"https:\/\/blog.lacnic.net\/en\/techniques-solutions-and-best-practices-for-mitigating-ddos-attacks\/#primaryimage"},"image":{"@id":"https:\/\/blog.lacnic.net\/en\/techniques-solutions-and-best-practices-for-mitigating-ddos-attacks\/#primaryimage"},"thumbnailUrl":"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2024\/09\/tecnicas-soluciones-buenas-practicas-para-mitigar-ataques-ciberneticos-2024-set.png","datePublished":"2024-09-18T18:03:32+00:00","dateModified":"2024-09-18T19:49:11+00:00","breadcrumb":{"@id":"https:\/\/blog.lacnic.net\/en\/techniques-solutions-and-best-practices-for-mitigating-ddos-attacks\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/blog.lacnic.net\/en\/techniques-solutions-and-best-practices-for-mitigating-ddos-attacks\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blog.lacnic.net\/en\/techniques-solutions-and-best-practices-for-mitigating-ddos-attacks\/#primaryimage","url":"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2024\/09\/tecnicas-soluciones-buenas-practicas-para-mitigar-ataques-ciberneticos-2024-set.png","contentUrl":"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2024\/09\/tecnicas-soluciones-buenas-practicas-para-mitigar-ataques-ciberneticos-2024-set.png","width":680,"height":330},{"@type":"BreadcrumbList","@id":"https:\/\/blog.lacnic.net\/en\/techniques-solutions-and-best-practices-for-mitigating-ddos-attacks\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Portada","item":"https:\/\/blog.lacnic.net\/en\/"},{"@type":"ListItem","position":2,"name":"Techniques, Solutions, and Best Practices for Mitigating DDoS Attacks"}]},{"@type":"WebSite","@id":"https:\/\/blog.lacnic.net\/#website","url":"https:\/\/blog.lacnic.net\/","name":"LACNIC Blog","description":"En el Blog de LACNIC encontrar\u00e1s art\u00edculos t\u00e9cnicos vinculados al desarrollo de Internet en la regi\u00f3n de Am\u00e9rica Latina y el Caribe.","publisher":{"@id":"https:\/\/blog.lacnic.net\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/blog.lacnic.net\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/blog.lacnic.net\/#organization","name":"LACNIC Blog","url":"https:\/\/blog.lacnic.net\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blog.lacnic.net\/#\/schema\/logo\/image\/","url":"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2023\/03\/lacnic-blog.svg","contentUrl":"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2023\/03\/lacnic-blog.svg","caption":"LACNIC Blog"},"image":{"@id":"https:\/\/blog.lacnic.net\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/facebook.com\/lacnic","https:\/\/x.com\/lacnic","https:\/\/www.instagram.com\/lacnic\/?hl=es-la","https:\/\/uy.linkedin.com\/company\/lacnic","https:\/\/www.youtube.com\/user\/lacnicstaff","https:\/\/www.lacnic.net\/podcast"]},{"@type":"Person","@id":"https:\/\/blog.lacnic.net\/#\/schema\/person\/1338d9cfdb0137e8bc5581f3771f39ab","name":"Gianni","url":"https:\/\/blog.lacnic.net\/en\/author\/gianni\/"}]}},"jetpack_publicize_connections":[],"jetpack_featured_media_url":"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2024\/09\/tecnicas-soluciones-buenas-practicas-para-mitigar-ataques-ciberneticos-2024-set.png","jetpack_sharing_enabled":true,"wpml_current_locale":"en_US","wpml_translations":[{"locale":"es_ES","id":27193,"post_title":"T\u00e9cnicas, soluciones y buenas pr\u00e1cticas para mitigar ataques de DDoS","slug":"tecnicas-soluciones-y-buenas-practicas-para-mitigar-ataques-de-ddos","href":"https:\/\/blog.lacnic.net\/tecnicas-soluciones-y-buenas-practicas-para-mitigar-ataques-de-ddos\/"},{"locale":"pt_BR","id":27207,"post_title":"T\u00e9cnicas, solu\u00e7\u00f5es e boas pr\u00e1ticas para mitigar ataques de DDoS","slug":"tecnicas-solucoes-e-boas-praticas-para-mitigar-ataques-de-ddos","href":"https:\/\/blog.lacnic.net\/pt-br\/tecnicas-solucoes-e-boas-praticas-para-mitigar-ataques-de-ddos\/"}],"_links":{"self":[{"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/posts\/27202","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/users\/6"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/comments?post=27202"}],"version-history":[{"count":2,"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/posts\/27202\/revisions"}],"predecessor-version":[{"id":27217,"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/posts\/27202\/revisions\/27217"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/media\/27196"}],"wp:attachment":[{"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/media?parent=27202"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/categories?post=27202"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/tags?post=27202"},{"taxonomy":"archivo","embeddable":true,"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/archivo?post=27202"},{"taxonomy":"taxonomy-authors","embeddable":true,"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/taxonomy-authors?post=27202"},{"taxonomy":"tipo_autor","embeddable":true,"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/tipo_autor?post=27202"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}